A method and system for propagation of myocardial infarction from delayed enhanced magnetic resonance imaging (DE-MRI) to cine MRI is disclosed. A reference frame is selected in a cine MRI sequence. deformation fields are calculated within the cine MRI sequence to register the frames of the cine MRI sequence to the reference frame. A DE-MRI image having an infarction region is registered to the reference frame of the cine MRI sequence. The DE-MRI image may be registered to the infarction region using a hybrid registration algorithm that unifies both intensity and feature points into a single cost function. Infarction information in the DE-MRI image is then propagated cardiac phases of the frames in the cine MRI sequence based on the registration of the DE-MRI image to the reference frame and the plurality of deformation fields calculated within the cine MRI sequence.

Patent
   8682054
Priority
Nov 15 2010
Filed
Nov 15 2011
Issued
Mar 25 2014
Expiry
Jul 19 2032
Extension
247 days
Assg.orig
Entity
Large
227
4
currently ok
1. A method for propagating at least a portion of a static image over a cardiac cycle, comprising:
selecting a reference frame of a cine image sequence comprising a plurality of frames;
calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame;
registering the static image to the reference frame of the cine image sequence; and
propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence based on a deformation field resulting from registering the static image to the reference frame and the plurality of deformation fields calculated within the cine image sequence.
13. An apparatus for propagating at least a portion of static image over a cardiac cycle, comprising:
means for selecting a reference frame of a cine image sequence comprising a plurality of frames;
means for calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame;
means for registering a static image to the reference frame of the cine image sequence; and
means for propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence based on a deformation field resulting from registering the static image to the reference frame and the plurality of deformation fields calculated within the cine image sequence.
23. A non-transitory computer readable medium encoded with computer executable instructions for propagating at least a portion of a static image over a cardiac cycle, the computer executable instructions defining steps comprising:
selecting a reference frame of a cine image sequence comprising a plurality of frames;
calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame;
registering a static image to the reference frame of the cine image sequence; and
propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence based on a deformation field resulting from registering the static image to the reference frame and the plurality of deformation fields calculated within the cine image sequence.
2. The method of claim 1, wherein the step of selecting a reference frame of a cine image sequence comprises:
selecting one of the plurality of frames in the cine image sequence that is most similar to the static image.
3. The method of claim 2, wherein the step of selecting one of the plurality of frames in the cine image sequence that is most similar to the static image comprises:
selecting one of the plurality of frames in the cine image sequence corresponding to a cardiac phase closest to a cardiac phase of the static image based on trigger times associated with the frames of the cine image sequence.
4. The method of claim 2, wherein the step of selecting one of the plurality of frames in the cine image sequence that is most similar to the static image comprises:
calculating a cross-correlation value between each frame of the cine image sequence and the static image; and
selecting the frame with the largest cross-correlation value as the reference frame.
5. The method of claim 1, wherein the step of calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame comprises:
registering each frame of the cine image sequence other than the reference frame to the reference frame using variational non-rigid registration with an inverse consistent constraint.
6. The method of claim 1, wherein the step of calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame comprises:
calculating a plurality of inverse consistent deformation fields to register the frames of the cine image sequence other than the reference frame to the reference frame.
7. The method of claim 1, wherein the step of registering the static image to the reference frame of the cine image sequence comprises:
registering the static image to the reference frame using a hybrid registration algorithm that unifies intensity-based and point-based similarity into a single cost function.
8. The method of claim 7, wherein the cost function includes a feature point matching term and an intensity matching term.
9. The method of claim 1, wherein the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
propagating the portion of the static image to a phase of the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the portion of the static image from the phase of the reference frame to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
10. The method of claim 1, wherein the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
deforming the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed static image to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
11. The method of claim 1, wherein the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
deforming a delineated contour corresponding to a region of interest in the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed contour to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
12. The method of claim 1, wherein the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
generating a region-of-interest in the reference frame by superimposing the portion of the static image onto the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the region-of-interest from the reference frame to each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
14. The apparatus of claim 13, wherein the means for selecting a reference frame of a cine image sequence comprises:
means for selecting one of the plurality of frames in the cine image sequence that is most similar to the static image.
15. The apparatus of claim 13, wherein the means for calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame comprises:
means for registering each frame of the cine image sequence other than the reference frame to the reference frame using variational non-rigid registration with an inverse consistent constraint.
16. The apparatus of claim 13, wherein the means for calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame comprises:
means for calculating a plurality of inverse consistent deformation fields to register the frames of the cine image sequence other than the reference frame to the reference frame.
17. The apparatus of claim 13, wherein the means for registering a static image to the reference frame of the cine image sequence comprises:
means for registering the static image to the reference frame using a hybrid registration algorithm that unifies intensity-based and point-based similarity into a single cost function.
18. The apparatus of claim 17, wherein the cost function includes a feature point matching term and an intensity matching term.
19. The apparatus of claim 13, wherein the means for propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
means for propagating the portion of the static image to a phase of the reference frame using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the portion of the static image from the phase of the reference frame to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
20. The apparatus of claim 13, wherein the means for propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
means for deforming the static image using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the deformed static image to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
21. The apparatus of claim 13, wherein the means for propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
means for deforming a delineated contour corresponding to a region of interest in the static image using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the deformed contour to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
22. The apparatus of claim 13, wherein the means for propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprises:
means for generating a region-of-interest in the reference frame by superimposing the portion of the static image onto the reference frame using the deformation field resulting from registering the static image to the reference frame; and
means for propagating the region-of-interest from the reference frame to each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
24. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of selecting a reference frame of a cine image sequence comprise computer executable instructions defining the step of:
selecting one of the plurality of frames in the cine image sequence that is most similar to the static image.
25. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame comprise computer executable instructions defining the step of:
registering each frame of the cine image sequence other than the reference frame to the reference frame using variational non-rigid registration with an inverse consistent constraint.
26. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of calculating a plurality of deformation fields within the cine image sequence to register the frames of the cine image sequence to the reference frame comprise computer executable instructions defining the step of:
calculating a plurality of inverse consistent deformation fields to register the frames of the cine image sequence other than the reference frame to the reference frame.
27. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of registering a static image to the reference frame of the cine MRI sequence comprise computer executable instructions defining the step of:
registering the static image to the reference frame using a hybrid registration algorithm that unifies intensity-based and point-based similarity into a single cost function.
28. The non-transitory computer readable medium of claim 27, wherein the cost function includes a feature point matching term and an intensity matching term.
29. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprise computer executable instructions defining the steps of:
propagating the portion of the static image to a phase of the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the portion of the static image from the phase of the reference frame to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
30. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprise computer executable instructions defining the steps of:
deforming the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed static image to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
31. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprise computer executable instructions defining the steps of:
deforming a delineated contour corresponding to a region of interest in the static image using the deformation field resulting from registering the static image to the reference frame; and
propagating the deformed contour to a phase associated with each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.
32. The non-transitory computer readable medium of claim 23, wherein the computer executable instructions defining the step of propagating at least a portion of the static image to a plurality of cardiac phases corresponding to the plurality of frames in the cine image sequence comprise computer executable instructions defining the steps of:
generating a region-of-interest in the reference frame by superimposing the portion of the static image onto the reference frame using the deformation field resulting from registering the static image to the reference frame; and
propagating the region-of-interest from the reference frame to each frame of the cine image sequence other than the reference frame using an inverse of a respective one of the plurality of deformation fields calculated within the cine image sequence.

This application claims the benefit of U.S. Provisional Application No. 61/413,606, filed Nov. 15, 2010, the disclosure of which is herein incorporated by reference.

The present invention relates to cardiac imaging, and more particularly, to propagation of myocardial infarction from delayed enhanced cardiac imaging to cine magnetic resonance imaging.

Cardiac magnetic resonance imaging (MRI) has been proven effective for determining patient-specific myocardial motion and functional information using cine imaging, as well as for detection of myocardial infarction using delayed enhanced MRI (DE-MRI). Recent studies have compared myocardial tissue viability revealed in the DE-MRI to the functional deficits measured with cine MRI, showing the so-called “peri-infarction zone” defined in DE-MRI is correlated well with the dysfunctional myocardial region defined in cine. This information is potentially valuable for reperfusion therapy, as regional motion of an infarction zone defined before the therapy is assessed to evaluate the recovery of myocardium.

Although the clinical value of joint DE-MRI and cine image assessment is exhibited, standard clinical cardiac MR protocols typically acquire two sets of images across multiple measurements with variant imaging plane prescription and multiple breath-holdings. Misalignment and local deformation often appear between cine and DE-MRI, even if the imaging plane remains unchanged for two acquisitions by careful prescription, mainly due to inconsistent cardiac phases used for acquiring cine and DE-MRI, imperfect cardiac gating and respiratory motion. It is more problematic for patients with arrhythmias, as unstable cardiac cycles make it unreliable to identify the matching cine frame acquired in the same cardiac cycle as the DE-MRI.

Without an accurate mapping of the infarction zone to the cine images, regional myocardial changes in motion pattern caused by suspicious scars can only be visually assessed. Accordingly, accurate alignment and deformation correction between cine and DE-MRI can be advantageous for successful joint assessment, where one aim is to propagate the infarction delineated in a DE-MRI to all cine frames throughout the whole cardiac cycle and to enable quantitative regional motion pattern analysis of the infarction.

The present invention provides a method and system for propagation of a myocardial infarction from a DE-MRI image to cine MRI images. Embodiments of the present invention provide dedicated post-processing algorithms for aligning a DE-MRI image with a corresponding cine image and propagating a suspicious infarction zone from the DE-MRI image to all other cardiac phases. Infarction regions delineated in the DE-MRI image can be used to define a region of interest (ROI) for the quantification of regional abnormality of myocardial motion.

In one embodiment of the present invention, a reference frame is selected in a cine MRI sequence having a plurality of frames. A plurality of deformation fields are calculated within the cine MRI sequence to register other frames in the cine MRI sequence with the reference frame. A DE-MRI image is registered to the reference frame of the cine MRI sequence. Infarction information in the DE-MRI image is then propagated over all a plurality of cardiac phases corresponding to the frames of the cine MRI sequence based on a deformation field resulting from registering the DE-MRI image to the reference frame and the deformation fields calculated within the cine MRI sequence.

These and other advantages of the invention will be apparent to those of ordinary skill in the art by reference to the following detailed description and the accompanying drawings.

FIG. 1 illustrates alignment of DE-MRI image to a cine image and propagation of the DE-MRI image according to an embodiment of the present invention;

FIG. 2 illustrates a method for propagating myocardial infarction information from a DE-MRI over a cardiac cycle according to an embodiment of a present invention;

FIG. 3 illustrates registration of a DE-MRI image to a reference cine frame using variational registration;

FIG. 4 illustrates exemplary results of registering DE-MRI image to a reference cine frame using a hybrid registration method;

FIG. 5 illustrates the three possible propagation schemes;

FIG. 6 illustrates exemplary propagation results using the method of FIG. 2;

FIG. 7 illustrates the area and thickness of an infarction region and a healthy myocardium over one cardiac cycle; and

FIG. 8 is a high level block diagram of a computer capable of implementing the present invention.

The present invention is directed to a method and system for propagation of myocardial infarction from delayed enhanced magnetic resonance imaging (DE-MRI) over a cardiac cycle using cine MRI. Embodiments of the present invention are described herein to give a visual understanding of the DE-MRI infarction propagation method. A digital image is often composed of digital representations of one or more objects (or shapes). The digital representation of an object is often described herein in terms of identifying and manipulating the objects. Such manipulations are virtual manipulations accomplished in the memory or other circuitry/hardware of a computer system. Accordingly, is to be understood that embodiments of the present invention may be performed within a computer system using data stored within the computer system.

Embodiments of the present invention provide align a DE-MRI image with a corresponding cine image and propagating a suspicious infarction zone from the DE-MRI image to all other cardiac phases of a cardiac cycle. Infarction regions delineated in the DE-MRI image can be used to define a region of interest (ROI) for the quantification of regional abnormality of myocardial motion. Embodiments of the present invention align the DE-MRI image to a cine image using a hybrid registration algorithm that unifies both intensity and feature points into one cost function. An intensity term is used to match two images on a coarse level, playing a role of regularization and dominating the alignment of normal myocardium, while a feature point term is robust against contrast changes between DE-MRI and cine, as in the cine images, the infarction zone bears little contrast as compared to normal myocardium and is largely invisible. The propagation of the infarction zone throughout the cine can be achieved by estimating myocardial deformation in the cine series using a variational non-rigid registration algorithm with inverse consistent constraint.

To align a DE-MRI image to a cine image and propagate suspicious infarction information, two types of deformation need to be estimated. The first corrects the mis-alignment between DE-MRI and cine and the second quantifies myocardial motion within the cine series. FIG. 1 illustrates alignment of DE-MRI image to a cine image and propagation of the DE-MRI image according to an embodiment of the present invention. As illustrated in FIG. 1, cl, l=1 . . . n denotes the cine images (frames); ck denotes the reference frame; E(pi) denotes the DE-MRI image; dk denotes the deformation from the reference frame ck to the DE-MRI image E(pi); dl, l=1 . . . n, l≠k denotes the deformation from cl to ck; pi denotes the pixel with index i; and El*, l=1 . . . n denotes propagated DE-MRI images. The solid line arrows in FIG. 1 show the deformation direction and the dashed line arrows in FIG. 1 show the propagation direction.

As multiple cine images are required to cover an entire cardiac cycle, while DE-MRI image is usually acquired at a specific temporal phase, the cine image which is most similar to the DE-MRI image is selected as the reference frame ck to which the DE-MRI image is registered. Assuming that the k-th cardiac phase is the reference cine image ck, the deformation dk, from ck to the DE-MRI image E(pi) is determined by a hybrid image registration method, and both forward and inverse deformation fields dl, l=1 . . . n, l≠k are determined by a variational method. Once all of the deformation fields dl, l=1 . . . n are calculated, the DE-MRI and infarction region can be propagated.

FIG. 2 illustrates a method for propagating myocardial infarction information from a DE-MRI over a cardiac cycle according to an embodiment of a present invention. As illustrated in FIG. 2, at step 202, a DE-MRI image having an infarction region is received. The DE-MRI image may be received directly from an MR scanner using a delayed-enhanced imaging technique. It is also possible that the DE-MRI image is received by loading a DE-MRI image previously stored in a storage or memory of a computer system. The infarction region may be delineated or segmented in the DE-MRI image. The infarction regions can be delineated manually or automatically using various segmentation methods. In one possible embodiment, a DE-MRI image having a delineated infarction region may be loaded from a memory or storage of a computer system. In another embodiment, the DE-MRI image is received and then segmented to delineate the infarction region.

At step 204, a cine MRI sequence is received. The DE-MRI image and the cine MRI sequence are of the same patient. The cine MRI sequence is a temporal sequence of multiple cardiac MRI images, each referred to as a “frame”. The cine MRI sequence can be received directly from an MR scanner. It is also possible that the cine MRI sequence can be received by loading a cine MRI sequence previously stored on a memory or storage of a computer system.

At step 206, a reference frame is selected from the cine MRI sequence. According to an advantageous implementation, the cine frame that is most similar to the DE-MRI image is selected as the reference frame. If available, a trigger time associated with each cine image may image may be used to select the cine frame at the closest cardiac phase to match the DE-MRI image. For example, the trigger times associated with cine MRI sequence may be stored in a database with the cine MRI sequence. For a cine sequence where trigger time is not recorded, the cross-correlation (CC) is calculated between every cine frame and the DE-MRI image, and the cine frame with the largest CC value is selected as the reference frame.

At step 208, deformation fields within the cine MRI sequence are calculated to register the frames of the cine MRI sequence to the reference frame. In order to propagate the suspicious infarction in the DE-MRI image from the reference frame to all other cine frames, the deformation between each cine frame and the reference frame may be estimated using a fast variational non-rigid registration algorithm. This approach can be considered as an extension of a classic optical flow method. In this framework, a dense deformation field is estimated as the solution to a calculus of variation problem, which is solved by performing a compositional update step corresponding to a transport equation. The regularization is added by low-pass filtering the gradient images which are in turn used as velocity field to drive the transport equation. To speedup the convergence and avoid local minima, a multi-scale image pyramid may be created. The local cross correlation can be used as the image similarity measure, as its explicit derivative can be more efficiently calculated than mutual information and it is still general enough to cope with intensity fluctuation and imaging noise between two adjacent perfusion frames.

Registration of time series such as MR cine is typically performed by selecting a reference phase to which all other phases are registered. This approach is not sufficient to propagate the DE-MRI image and/or the infarction zone, which represented as a contoured region in the DE-MRI image, throughout the cardiac phases. Specifically, deformation fields pointing to the reference phase are required to warp the DE-MRI image while the inverse deformations pointing from reference phase to other frames are needed to warp the infarction contours. Accordingly the above-mentioned registration algorithm is extended to estimate inverse consistent deformation fields.

A deformation field Φpq is inverse consistent if Φpq·Φpq−1=I and Φpq−1qp·Φpq is calculated by minimizing the inverse consistent similarity metric:
JicCC=JCC(fp,fqpq)+JCC(fq,fpqp)  (1)
Here JCC is the local cross-correlation. fp and fq are two cine phases (frames). The deformation between fp and fq is Φpq:custom character2custom character2.

An efficient update scheme of iterative gradient descent can be used in order to minimize the inverse consistent similarity in a reasonable time. In particular, each deformation field is alternately updated during descending the gradient of the similarity measure resulting in an accurate computation of the inverse deformation and a quasi-symmetric registration algorithm. The achieved inverse consistency of the deformation fields not only allows for propagating both images and contours between any two cardiac phases, but may also leads to more accurate quasi-symmetric image registration.

At step 210, the DE-MRI image is registered to the reference cine frame. The variational deformable registration method described above in connection with step 208 is robust for cine images, as each adjacent image pair shows similar image content and contrast. Unfortunately, it is less suitable to register the DE-MRI image to the cine reference frame, as the DE-MRI image often presents a strongly enhanced infarction zone which bears no contrast in the cine series. As a result, the pixel-wise variational registration tends to generate unrealistic large deformation which degrades the image quality of warped DE-MRI images even with aggressive regularization. FIG. 3 illustrates registration of a DE-MRI image to a reference cine frame using variational registration. As shown in FIG. 3, image (a) shows the DE-MRI image before registration and image (b) shows the warped DE-MRI image after registration. As shown in image (b), the warped DE-MRI image shows unrealistic deformation due to enhanced infarction bearing no contrast in the reference cine frame.

According to an advantageous embodiment of the present invention, in order to cope with inconsistent visibility between the DE-MRI and cine images and produce robust registration, a hybrid registration algorithm, which unifies intensity-based and point-based similarity into one cost function, may be used for registering the DE-MRI image to the reference cine frame. This cost function contains two terms: a feature point matching term and an intensity matching term. The point matching term is robust against contrast changes and occlusions between DE-MRI and the reference cine. The intensity term enforces the alignment of the myocardium with normal contrast uptake, playing a role of global regularization. The underlying deformation can be modeled as a Free-from deformation (FFD), which is a piece-wise cubic polynomial. Compared to pixel-wise variational registration, FFD is more robust against image content changes.

FFD can be manipulated by a regular control grid with spacing sx×sy for a 2D image. FFD is computationally efficient, because the deformation at any point is only influenced by that point's surrounding 4×4 control points. For a point p with coordinates (x, y), it is assumed that its 4×4 control points are pi.j, i, j=0, . . . , 3. di.j denotes the displacement vector associated with the control point pi.j and the interpolation at point p is defined as:

T ( p d ij ) = i = 0 3 j = 0 3 B i ( u ) B j ( v ) d ij , ( 2 )
where u=x/sx−└x/sx┘, v=y/sy−└y/sy┘, and Bi is the i-th basis function of B-splines.

Given reference image R(pi), i=1, . . . , N (e.g., the reference cine frame) and its feature point set {sj}j=1M, and floating image F(pi) (e.g., the DE-MRI image) and its feature point set {tj}j=1M, the images can be registered by solving the following minimization problem:

D ^ = argmin D ( λ M M T ( s j D ) - t j 2 + N ( R ( p i ) - R _ ) - ( F ( T ( p i D ) ) - F _ ) N ( R ( p i ) - R _ ) 2 N ( F ( T ( p i D ) ) - F _ ) 2 ) ( 3 )
where the first term of the cost function to be minimized is the point matching term and the second term is the intensity matching term. R is the reference image (reference cine frame) and F is the floating image (DE-MRI image). R and F are the mean intensity of the R and F, respectively. D is the unknown deformation parameter set {dij}. λ is a parameter that is used to balance the influence of the two terms of the cost function. The value of λ depends on the metric used in the intensity term. In a possible implement, Cross-Correlation (CC) can be used as the intensity metric and λ can be set to −0.5. Equation (2) can be solved by limited memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) optimization, which is more efficient than simple gradient descent for high dimensional optimization problems. L-BFGS optimization is well known to those skilled in the art.

FIG. 4 illustrates exemplary results of registering DE-MRI image to a reference cine frame using the hybrid registration method. As illustrated in FIG. 4, image (a) is the reference cine images, image (b) is the original DE-MRI image, and image (c) is the aligned DE-MRI, which was registered to the reference cine image using the hybrid method described above (Cross-Correlation with Point Distance (CCPD)). In images (d), (e), and (f), a contour of the myocardium is delineated to show a comparison of the hybrid CCPD registration and non-hybrid intensity based registration (Cross-Correlation (CC)). In particular, image (d) shows the DE-MRI image with the delineated myocardium contour 402 before registration, image (e) shows the aligned DE-MRI image with the delineated myocardium contour 404 resulting from CC registration, and image (f) shows the aligned DE-MRI image with the delineated myocardium contour 406 resulting from the hybrid CCPD registration.

Returning to FIG. 2, at step 212, infarction information from the DE-MRI image is propagated over all cardiac phases in the cine sequence. The information from the DE-MRI image is propagated based on the deformation field resulting from the registration of the DE-MRI to the reference cine frame and the deformation fields generated within the cine sequence to register each frame to the reference frame. Referring again to FIG. 1, once all deformation fields dl, l=1 . . . n are calculated, the DE-MRI image E can be propagated to yield all n cardiac phases: E*l, l=1 . . . n. In order to propagate the DE-MRI image, the DE-MRI image E is first deformed to E*k using E*k=E(dk(pi)). Then, E*k is propagated to the remaining n−1 phases using E*l=E*k(dl(pi)), l=1 . . . n, l≠k. This propagation of the DE-MRI image requires the inverse deformation fields pointing from the reference cine frame to the other n−1 phases. This inverse deformation fields are provided by the inverse consistent registration of the cine frames to the reference cine frame as described in step 208.

According to an embodiment of the present invention, in order to better present propagated infarction information from the DE-MRI image, three propagation schemes can be implemented: whole DE-MRI image propagation, infarction contour propagation, and region-of-interest (ROI) propagation. FIG. 5 illustrates the three possible propagation schemes. As illustrated in FIG. 5, image (a) shows a whole DE-MRI image, image (b) shows a ROI 502 defined by superimposing an infarction region of a DE-MRI image on a cine image, and image (c) shows a delineated infarction contour 504 in a DE-MRI image. Whole DE-MRI image approximation resamples the whole DE-MRI image to the phases of the frames of the cine sequence, as described above and shown in FIG. 1. Contour propagation only deforms the scar (infarction) boundary in the DE-MRI image over all of the cardiac phases. The contour propagation is performed similarly to the whole DE-MRI image propagation, but using only the pixels on the delineated infarction contour in the DE-MRI image. The ROI propagation scheme transforms the infarction region in the DE-MRI image and superimposes the infarction region directly on the cine images. In this case, an ROI is first superimposed on the reference cine frame using the deformation field resulting from the registration of the DE-MRI image to the reference cine frame. The ROI is then superimposed on the remaining cine frames using the inverse deformation fields of the inverse consistent deformation fields generated within the cine sequence. It is to be understood that any of the three propagation schemes, separately or together, can be used to implement step 212 of FIG. 2.

Returning to FIG. 2, at step 214 the propagation results are output. For example, the propagation results can be output by displaying the propagation results (e.g., propagated DE-MRI image, propagated infarction contour, and/or cine frames with superimposed infarction ROI) on a display device of a computer system. The propagation results can also be output by storing the propagation results or a memory or storage of a computer system. The propagation results can then be further processed, for example to provide quantitative regional motion analysis for the infarction region.

FIG. 6 illustrates exemplary propagation results using the method of FIG. 2. As illustrated in FIG. 6, the first row of images shows cine images 602, 604, and 606 of a cine MRI sequence. Image 604 is the reference cine frame (ck). The second row shows propagated DE-MRI images 612, 614, and 616 propagated to the phases of cine frames 602, 604, and 606, respectively. Accordingly, image 614 is the deformed DE-MRI image (E*k) to be registered to the reference cine frame (ck) 604. The third row shows propagated infarction contours 622, 624, and 626 propagated to the phases of cine frames 602, 604, and 606, respectively, and the fourth row shows a zoomed in view of the propagated infarction contours 622, 624, and 626.

Once the infarction information is propagated using the method of FIG. 2, the propagation results can be used for quantitative regional motion analysis for the infarction region. Suspicious infarction can degrade myocardial contraction. To highlight the potential of the above described method for abnormal motion pattern detection, the present inventors conducted experiments in which the scar (infarction) region is delineated in the DE-MRI image and the myocardial segment containing the scar labeled. Both the contour and segment are propagated to all cardiac phases using the estimated forward/inverse deformation fields. At each phase p, the area of the infarction zone Ap is computed by counting the number of the internal pixels in the infarction region. The thickness Tp of the infarction zone is computed by calculating the epi/endo distance of the segment. To alleviate inter-subject variability, Ap and Tp are normalized with respect to phase 0, i.e., Ap=Ap/A0, Tp=Tp/T0. For comparison, the normal myocardium is also delineated, of which the area and thickness are also computed. FIG. 7 illustrates the area and thickness of the infarction region and the healthy myocardium over one cardiac cycle for one test case. As shown in FIG. 7, the area 702 and thickness 704 of healthy (non-infarction) myocardium is found to change more significantly over cardiac phases of the cardiac cycle as compared to the area 706 and thickness of the infarction zone.

To quantify the change potentially caused by the suspicious infarction, (Ap−A0)/A0 is used to represent the relative area change and (Tp−T0)/T0, basically the segment strain ratio, is used to represent the relative thickness change. The mean and variance of 6 cases are listed in Table 2.

TABLE 2
Area/Thickness change %.
Cases
1 2 3 4 5 6
ACI 4.5 ± 0.1 4.5 ± 0.2 8.4 ± 0.4 9.7 ± 1.1 3.1 ± 0.1 6.3 ± 0.2
ACN 13.1 ± 0.7  4.6 ± 0.2 6.7 ± 0.3 2.5 ± 0.0 10.6 ± 1.1  8.0 ± 0.2
TCI 2.7 ± 0.1 3.8 ± 0.1 5.9 ± 0.3 7.2 ± 0.3 3.7 ± 0.1 5.3 ± 0.2
TCN 23.5 ± 5.1  19.9 ± 4.9  15.5 ± 2.6  7.6 ± 0.7 20.0 ± 3.1  14.6 ± 1.1 
ACI: Area Change of Infarction zone.
ACN: Area Change of Normal myocardium.
TCI: Thickness Change of Infarction zone.
TCN: Thickness Change of Normal myocardium.

Cases 1 and 5 show a noticeable decrease of both area and thickness changes for the infarction, while thickness dropped more in cases 2, 3 and 6. Interestingly, case 4 shows the contrary that relative area change increases for the infarction, although the registration and propagation performed well, which was verified by visual reading. These experiments reveal the feasibility of joint DE-MRI and cine assessment.

The above-described methods for propagation of infarction information from a DE-MRI image based on a cine MRI sequence may be implemented on a computer using well-known computer processors, memory units, storage devices, computer software, and other components. A high level block diagram of such a computer is illustrated in FIG. 8. Computer 802 contains a processor 804 which controls the overall operation of the computer 802 by executing computer program instructions which define such operation. The computer program instructions may be stored in a storage device 812, or other computer readable medium (e.g., magnetic disk, CD ROM, etc.) and loaded into memory 810 when execution of the computer program instructions is desired. Thus, the steps of the method of FIG. 2 may be defined by the computer program instructions stored in the memory 810 and/or storage 812 and controlled by the processor 804 executing the computer program instructions. An MR scanning device 820 can be connected to the computer 802 to input MRI images to the computer 802. It is possible to implement the MR scanning device 820 and the computer 802 as one device. It is also possible that the MR scanning device 820 and the computer 802 communicate wirelessly through a network. The computer 802 also includes one or more network interfaces 806 for communicating with other devices via a network. The computer 802 also includes other input/output devices 808 that enable user interaction with the computer 802 (e.g., display, keyboard, mouse, speakers, buttons, etc.). One skilled in the art will recognize that an implementation of an actual computer could contain other components as well, and that FIG. 8 is a high level representation of some of the components of such a computer for illustrative purposes.

The foregoing Detailed Description is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that the embodiments shown and described herein are only illustrative of the principles of the present invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention.

Jolly, Marie-Pierre, Gühring, Jens, Xue, Hui, Guetter, Christoph, Liu, Yixun

Patent Priority Assignee Title
10025927, Mar 13 2013 Musarubra US LLC Malicious content analysis with multi-version application support within single operating environment
10027689, Sep 29 2014 Musarubra US LLC Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
10027690, Apr 01 2004 Musarubra US LLC Electronic message analysis for malware detection
10027696, Aug 22 2014 Musarubra US LLC System and method for determining a threat based on correlation of indicators of compromise from other sources
10033747, Sep 29 2015 Musarubra US LLC System and method for detecting interpreter-based exploit attacks
10050998, Dec 30 2015 Musarubra US LLC Malicious message analysis system
10068091, Apr 01 2004 Musarubra US LLC System and method for malware containment
10075455, Dec 26 2014 Musarubra US LLC Zero-day rotating guest image profile
10084813, Jun 24 2014 Musarubra US LLC Intrusion prevention and remedy system
10097573, Apr 01 2004 Musarubra US LLC Systems and methods for malware defense
10122746, Mar 14 2013 Musarubra US LLC Correlation and consolidation of analytic data for holistic view of malware attack
10133863, Jun 24 2013 Musarubra US LLC Zero-day discovery system
10133866, Dec 30 2015 Musarubra US LLC System and method for triggering analysis of an object for malware in response to modification of that object
10148693, Mar 25 2015 Musarubra US LLC Exploit detection system
10165000, Apr 01 2004 Musarubra US LLC Systems and methods for malware attack prevention by intercepting flows of information
10169585, Jun 22 2016 Musarubra US LLC System and methods for advanced malware detection through placement of transition events
10176321, Dec 11 2015 Musarubra US LLC Leveraging behavior-based rules for malware family classification
10198574, Mar 13 2013 Musarubra US LLC System and method for analysis of a memory dump associated with a potentially malicious content suspect
10200384, Mar 14 2013 Musarubra US LLC Distributed systems and methods for automatically detecting unknown bots and botnets
10210329, Sep 30 2015 Musarubra US LLC Method to detect application execution hijacking using memory protection
10218740, Sep 30 2013 Musarubra US LLC Fuzzy hash of behavioral results
10242185, Mar 21 2014 Musarubra US LLC Dynamic guest image creation and rollback
10268918, Nov 20 2014 Canon Kabushiki Kaisha Image processing apparatus and method for calculating image deformation between images
10284574, Apr 01 2004 Musarubra US LLC System and method for threat detection and identification
10284575, Nov 10 2015 Musarubra US LLC Launcher for setting analysis environment variations for malware detection
10296437, Feb 23 2013 Musarubra US LLC Framework for efficient security coverage of mobile software applications
10341363, Mar 31 2014 Musarubra US LLC Dynamically remote tuning of a malware content detection system
10341365, Dec 30 2015 Musarubra US LLC Methods and system for hiding transition events for malware detection
10366231, Dec 22 2014 Musarubra US LLC Framework for classifying an object as malicious with machine learning for deploying updated predictive models
10404725, Aug 22 2014 Musarubra US LLC System and method of detecting delivery of malware using cross-customer data
10417031, Mar 31 2015 Musarubra US LLC Selective virtualization for security threat detection
10432649, Mar 20 2014 Musarubra US LLC System and method for classifying an object based on an aggregated behavior results
10445502, Dec 31 2015 Musarubra US LLC Susceptible environment detection system
10447728, Dec 10 2015 Musarubra US LLC Technique for protecting guest processes using a layered virtualization architecture
10454950, Jun 30 2015 Musarubra US LLC Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
10454953, Mar 28 2014 Musarubra US LLC System and method for separated packet processing and static analysis
10462173, Jun 30 2016 Musarubra US LLC Malware detection verification and enhancement by coordinating endpoint and malware detection systems
10467411, Dec 26 2013 Musarubra US LLC System and method for generating a malware identifier
10469512, May 10 2013 Musarubra US LLC Optimized resource allocation for virtual machines within a malware content detection system
10474813, Mar 31 2015 Musarubra US LLC Code injection technique for remediation at an endpoint of a network
10476906, Mar 25 2016 Musarubra US LLC System and method for managing formation and modification of a cluster within a malware detection system
10476909, Dec 26 2013 Musarubra US LLC System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
10491627, Sep 29 2016 Musarubra US LLC Advanced malware detection using similarity analysis
10503904, Jun 29 2017 Musarubra US LLC Ransomware detection and mitigation
10505956, Jul 18 2013 Musarubra US LLC System and method for detecting malicious links in electronic messages
10511614, Apr 01 2004 Musarubra US LLC Subscription based malware detection under management system control
10515214, Sep 30 2013 Musarubra US LLC System and method for classifying malware within content created during analysis of a specimen
10523609, Dec 27 2016 Musarubra US LLC Multi-vector malware detection and analysis
10528726, Dec 29 2014 Musarubra US LLC Microvisor-based malware detection appliance architecture
10534906, Feb 05 2014 Musarubra US LLC Detection efficacy of virtual machine-based analysis with application specific events
10552610, Dec 22 2016 Musarubra US LLC Adaptive virtual machine snapshot update framework for malware behavioral analysis
10554507, Mar 30 2017 Musarubra US LLC Multi-level control for enhanced resource and object evaluation management of malware detection system
10565378, Dec 30 2015 Musarubra US LLC Exploit of privilege detection framework
10567405, Apr 01 2004 Musarubra US LLC System for detecting a presence of malware from behavioral analysis
10572665, Dec 28 2012 Musarubra US LLC System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
10581874, Dec 31 2015 Musarubra US LLC Malware detection system with contextual analysis
10581879, Dec 22 2016 Musarubra US LLC Enhanced malware detection for generated objects
10581898, Dec 30 2015 Musarubra US LLC Malicious message analysis system
10587636, Apr 01 2004 Musarubra US LLC System and method for bot detection
10587647, Nov 22 2016 Musarubra US LLC Technique for malware detection capability comparison of network security devices
10592678, Sep 09 2016 Musarubra US LLC Secure communications between peers using a verified virtual trusted platform module
10601848, Jun 29 2017 Musarubra US LLC Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
10601863, Mar 25 2016 Musarubra US LLC System and method for managing sensor enrollment
10601865, Sep 30 2015 Musarubra US LLC Detection of credential spearphishing attacks using email analysis
10616266, Mar 25 2016 Musarubra US LLC Distributed malware detection system and submission workflow thereof
10621338, Dec 30 2015 Musarubra US LLC Method to detect forgery and exploits using last branch recording registers
10623434, Apr 01 2004 Musarubra US LLC System and method for virtual analysis of network data
10637880, May 15 2013 Musarubra US LLC Classifying sets of malicious indicators for detecting command and control communications associated with malware
10642753, Jun 30 2015 Musarubra US LLC System and method for protecting a software component running in virtual machine using a virtualization layer
10657251, Sep 30 2013 Musarubra US LLC Multistage system and method for analyzing obfuscated content for malware
10666686, Mar 25 2015 Musarubra US LLC Virtualized exploit detection system
10671721, Mar 25 2016 Musarubra US LLC Timeout management services
10671726, Sep 22 2014 Musarubra US LLC System and method for malware analysis using thread-level event monitoring
10673867, Mar 30 2017 FireEye, Inc.; FIREEYE, INC System and method for enforcing compliance with subscription requirements for cyber-attack detection service
10701091, Mar 15 2013 Musarubra US LLC System and method for verifying a cyberthreat
10706149, Sep 30 2015 Musarubra US LLC Detecting delayed activation malware using a primary controller and plural time controllers
10713358, Mar 15 2013 GOOGLE LLC System and method to extract and utilize disassembly features to classify software intent
10713362, Sep 30 2013 Musarubra US LLC Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
10715542, Aug 14 2015 Musarubra US LLC Mobile application risk analysis
10726127, Jun 30 2015 Musarubra US LLC System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
10728263, Apr 13 2015 Musarubra US LLC Analytic-based security monitoring system and method
10735458, Sep 30 2013 Musarubra US LLC Detection center to detect targeted malware
10740456, Jan 16 2014 Musarubra US LLC Threat-aware architecture
10747872, Sep 27 2017 Musarubra US LLC System and method for preventing malware evasion
10757120, Apr 01 2004 Musarubra US LLC Malicious network content detection
10757134, Jun 24 2014 Musarubra US LLC System and method for detecting and remediating a cybersecurity attack
10785255, Mar 25 2016 Musarubra US LLC Cluster configuration within a scalable malware detection system
10791138, Mar 30 2017 Musarubra US LLC Subscription-based malware detection
10795991, Nov 08 2016 Musarubra US LLC Enterprise search
10798112, Mar 30 2017 Musarubra US LLC Attribute-controlled malware detection
10798121, Dec 30 2014 Musarubra US LLC Intelligent context aware user interaction for malware detection
10805340, Jun 26 2014 Musarubra US LLC Infection vector and malware tracking with an interactive user display
10805346, Oct 01 2017 Musarubra US LLC Phishing attack detection
10812513, Mar 14 2013 Musarubra US LLC Correlation and consolidation holistic views of analytic data pertaining to a malware attack
10817606, Sep 30 2015 Musarubra US LLC Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
10826931, Mar 29 2018 Musarubra US LLC System and method for predicting and mitigating cybersecurity system misconfigurations
10834107, Nov 10 2015 Musarubra US LLC Launcher for setting analysis environment variations for malware detection
10846117, Dec 10 2015 Musarubra US LLC Technique for establishing secure communication between host and guest processes of a virtualization architecture
10848397, Mar 30 2017 Musarubra US LLC System and method for enforcing compliance with subscription requirements for cyber-attack detection service
10848521, Mar 13 2013 Musarubra US LLC Malicious content analysis using simulated user interaction without user involvement
10855700, Jun 29 2017 Musarubra US LLC Post-intrusion detection of cyber-attacks during lateral movement within networks
10868818, Sep 29 2014 Musarubra US LLC Systems and methods for generation of signature generation using interactive infection visualizations
10872151, Dec 30 2015 Musarubra US LLC System and method for triggering analysis of an object for malware in response to modification of that object
10873597, Sep 30 2015 Musarubra US LLC Cyber attack early warning system
10887328, Sep 29 2015 Musarubra US LLC System and method for detecting interpreter-based exploit attacks
10893059, Mar 31 2016 Musarubra US LLC Verification and enhancement using detection systems located at the network periphery and endpoint devices
10893068, Jun 30 2017 Musarubra US LLC Ransomware file modification prevention technique
10902117, Dec 22 2014 Musarubra US LLC Framework for classifying an object as malicious with machine learning for deploying updated predictive models
10902119, Mar 30 2017 Musarubra US LLC Data extraction system for malware analysis
10904286, Mar 24 2017 Musarubra US LLC Detection of phishing attacks using similarity analysis
10929266, Feb 23 2013 Musarubra US LLC Real-time visual playback with synchronous textual analysis log display and event/time indexing
10956477, Mar 30 2018 GOOGLE LLC System and method for detecting malicious scripts through natural language processing modeling
11003773, Mar 30 2018 Musarubra US LLC System and method for automatically generating malware detection rule recommendations
11005860, Dec 28 2017 GOOGLE LLC Method and system for efficient cybersecurity analysis of endpoint events
11068587, Mar 21 2014 Musarubra US LLC Dynamic guest image creation and rollback
11075930, Jun 27 2018 Musarubra US LLC System and method for detecting repetitive cybersecurity attacks constituting an email campaign
11075945, Sep 30 2013 Musarubra US LLC System, apparatus and method for reconfiguring virtual machines
11082435, Apr 01 2004 Musarubra US LLC System and method for threat detection and identification
11082436, Mar 28 2014 Musarubra US LLC System and method for offloading packet processing and static analysis operations
11089057, Dec 26 2013 Musarubra US LLC System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
11108809, Oct 27 2017 GOOGLE LLC System and method for analyzing binary code for malware classification using artificial neural network techniques
11113086, Jun 30 2015 Musarubra US LLC Virtual system and method for securing external network connectivity
11153341, Apr 01 2004 Musarubra US LLC System and method for detecting malicious network content using virtual environment components
11182473, Sep 13 2018 Musarubra US LLC System and method for mitigating cyberattacks against processor operability by a guest process
11200080, Dec 11 2015 Musarubra US LLC Late load technique for deploying a virtualization layer underneath a running operating system
11210390, Mar 13 2013 Musarubra US LLC Multi-version application support and registration within a single operating system environment
11228491, Jun 28 2018 Musarubra US LLC System and method for distributed cluster configuration monitoring and management
11240262, Jun 30 2016 Musarubra US LLC Malware detection verification and enhancement by coordinating endpoint and malware detection systems
11240275, Dec 28 2017 Musarubra US LLC Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
11244044, Sep 30 2015 Musarubra US LLC Method to detect application execution hijacking using memory protection
11244056, Jul 01 2014 Musarubra US LLC Verification of trusted threat-aware visualization layer
11258806, Jun 24 2019 GOOGLE LLC System and method for automatically associating cybersecurity intelligence to cyberthreat actors
11271955, Dec 28 2017 Musarubra US LLC Platform and method for retroactive reclassification employing a cybersecurity-based global data store
11294705, Mar 31 2015 Musarubra US LLC Selective virtualization for security threat detection
11297074, Mar 31 2014 Musarubra US LLC Dynamically remote tuning of a malware content detection system
11314859, Jun 27 2018 Musarubra US LLC Cyber-security system and method for detecting escalation of privileges within an access token
11316900, Jun 29 2018 Musarubra US LLC System and method for automatically prioritizing rules for cyber-threat detection and mitigation
11368475, Dec 21 2018 Musarubra US LLC System and method for scanning remote services to locate stored objects with malware
11381578, Jan 13 2012 Musarubra US LLC Network-based binary file extraction and analysis for malware detection
11392700, Jun 28 2019 Musarubra US LLC System and method for supporting cross-platform data verification
11399040, Mar 30 2017 Musarubra US LLC Subscription-based malware detection
11552986, Dec 31 2015 Musarubra US LLC Cyber-security framework for application of virtual features
11556640, Jun 27 2019 GOOGLE LLC Systems and methods for automated cybersecurity analysis of extracted binary string sets
11558401, Mar 30 2018 Musarubra US LLC Multi-vector malware detection data sharing system for improved detection
11570211, Mar 24 2017 Musarubra US LLC Detection of phishing attacks using similarity analysis
11632392, Mar 25 2016 Musarubra US LLC Distributed malware detection system and submission workflow thereof
11637857, Apr 01 2004 Musarubra US LLC System and method for detecting malicious traffic using a virtual machine configured with a select software environment
11637859, Oct 27 2017 GOOGLE LLC System and method for analyzing binary code for malware classification using artificial neural network techniques
11637862, Sep 30 2019 GOOGLE LLC System and method for surfacing cyber-security threats with a self-learning recommendation engine
11763004, Sep 27 2018 Musarubra US LLC System and method for bootkit detection
11856011, Mar 30 2018 Musarubra US LLC Multi-vector malware detection data sharing system for improved detection
11863581, Mar 30 2017 Musarubra US LLC Subscription-based malware detection
11868795, Mar 31 2015 Musarubra US LLC Selective virtualization for security threat detection
11882140, Jun 27 2018 Musarubra US LLC System and method for detecting repetitive cybersecurity attacks constituting an email campaign
11886585, Sep 27 2019 Musarubra US LLC System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
11936666, Mar 31 2016 Musarubra US LLC Risk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk
11949692, Dec 28 2017 GOOGLE LLC Method and system for efficient cybersecurity analysis of endpoint events
11949698, Mar 31 2014 Musarubra US LLC Dynamically remote tuning of a malware content detection system
11979428, Mar 31 2016 Musarubra US LLC Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
11997111, Mar 30 2017 Musarubra US LLC Attribute-controlled malware detection
12063229, Jun 24 2019 GOOGLE LLC System and method for associating cybersecurity intelligence to cyberthreat actors through a similarity matrix
12069087, Oct 27 2017 GOOGLE LLC System and method for analyzing binary code for malware classification using artificial neural network techniques
12074887, Dec 21 2018 Musarubra US LLC System and method for selectively processing content after identification and removal of malicious content
9159035, Feb 23 2013 Musarubra US LLC Framework for computer application analysis of sensitive information tracking
9176843, Feb 23 2013 Musarubra US LLC Framework for efficient security coverage of mobile software applications
9223972, Mar 31 2014 Musarubra US LLC Dynamically remote tuning of a malware content detection system
9225740, Feb 23 2013 Musarubra US LLC Framework for iterative analysis of mobile software applications
9262635, Feb 05 2014 Musarubra US LLC Detection efficacy of virtual machine-based analysis with application specific events
9282109, Apr 01 2004 Musarubra US LLC System and method for analyzing packets
9294501, Sep 30 2013 Musarubra US LLC Fuzzy hash of behavioral results
9300686, Jun 28 2013 Musarubra US LLC System and method for detecting malicious links in electronic messages
9306960, Apr 01 2004 Musarubra US LLC Systems and methods for unauthorized activity defense
9306974, Dec 26 2013 Musarubra US LLC System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
9311479, Mar 14 2013 Musarubra US LLC Correlation and consolidation of analytic data for holistic view of a malware attack
9355247, Mar 13 2013 Musarubra US LLC File extraction from memory dump for malicious content analysis
9363280, Aug 22 2014 Musarubra US LLC System and method of detecting delivery of malware using cross-customer data
9367681, Feb 23 2013 Musarubra US LLC Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
9398028, Jun 26 2014 Musarubra US LLC System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
9430646, Mar 14 2013 Musarubra US LLC Distributed systems and methods for automatically detecting unknown bots and botnets
9432389, Mar 31 2014 Musarubra US LLC System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
9438613, Mar 30 2015 Musarubra US LLC Dynamic content activation for automated analysis of embedded objects
9438622, Nov 03 2008 Musarubra US LLC Systems and methods for analyzing malicious PDF network content
9438623, Jun 06 2014 Musarubra US LLC Computer exploit detection using heap spray pattern matching
9478013, Jun 28 2012 KONINKLIJKE PHILIPS N V System and method for registering an image sequence
9483644, Mar 31 2015 Musarubra US LLC Methods for detecting file altering malware in VM based analysis
9495180, May 10 2013 Musarubra US LLC Optimized resource allocation for virtual machines within a malware content detection system
9516057, Apr 01 2004 Musarubra US LLC Systems and methods for computer worm defense
9589135, Sep 29 2014 FireEye, Inc. Exploit detection of malware and malware families
9591015, Mar 28 2014 Musarubra US LLC System and method for offloading packet processing and static analysis operations
9591020, Apr 01 2004 Musarubra US LLC System and method for signature generation
9594904, Apr 23 2015 Musarubra US LLC Detecting malware based on reflection
9594905, Feb 23 2013 Musarubra US LLC Framework for efficient security coverage of mobile software applications using machine learning
9594912, Jun 06 2014 Musarubra US LLC Return-oriented programming detection
9596258, Sep 30 2013 FireEye, Inc. System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
9609007, Aug 22 2014 Musarubra US LLC System and method of detecting delivery of malware based on indicators of compromise from different sources
9626509, Mar 13 2013 Musarubra US LLC Malicious content analysis with multi-version application support within single operating environment
9628498, Apr 01 2004 Musarubra US LLC System and method for bot detection
9628507, Sep 30 2013 Musarubra US LLC Advanced persistent threat (APT) detection center
9641546, Mar 14 2013 Musarubra US LLC Electronic device for aggregation, correlation and consolidation of analysis attributes
9661009, Jun 26 2014 Musarubra US LLC Network-based malware detection
9661018, Apr 01 2004 Musarubra US LLC System and method for detecting anomalous behaviors using a virtual machine environment
9690606, Mar 25 2015 Musarubra US LLC Selective system call monitoring
9690933, Dec 22 2014 Musarubra US LLC Framework for classifying an object as malicious with machine learning for deploying updated predictive models
9690936, Sep 30 2013 Musarubra US LLC Multistage system and method for analyzing obfuscated content for malware
9736179, Sep 30 2013 Musarubra US LLC System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
9747446, Dec 26 2013 Musarubra US LLC System and method for run-time object classification
9756074, Dec 26 2013 Musarubra US LLC System and method for IPS and VM-based detection of suspicious objects
9773112, Sep 29 2014 Musarubra US LLC Exploit detection of malware and malware families
9787700, Mar 28 2014 Musarubra US LLC System and method for offloading packet processing and static analysis operations
9792196, Feb 23 2013 Musarubra US LLC Framework for efficient security coverage of mobile software applications
9824216, Dec 31 2015 Musarubra US LLC Susceptible environment detection system
9825976, Sep 30 2015 Musarubra US LLC Detection and classification of exploit kits
9825989, Sep 30 2015 Musarubra US LLC Cyber attack early warning system
9832212, Apr 01 2004 FireEye, Inc. Electronic message analysis for malware detection
9838408, Jun 26 2014 Musarubra US LLC System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers
9838411, Apr 01 2004 Musarubra US LLC Subscriber based protection system
9838416, Jun 14 2004 Musarubra US LLC System and method of detecting malicious content
9838417, Dec 30 2014 Musarubra US LLC Intelligent context aware user interaction for malware detection
9846776, Mar 31 2015 Musarubra US LLC System and method for detecting file altering behaviors pertaining to a malicious attack
9888019, Jul 18 2013 Musarubra US LLC System and method for detecting malicious links in electronic messages
9910988, Sep 30 2013 Musarubra US LLC Malware analysis in accordance with an analysis plan
9912684, Apr 01 2004 Musarubra US LLC System and method for virtual analysis of network data
9912691, Sep 30 2013 Musarubra US LLC Fuzzy hash of behavioral results
9916440, Feb 05 2014 Musarubra US LLC Detection efficacy of virtual machine-based analysis with application specific events
9921978, Nov 08 2013 Musarubra US LLC System and method for enhanced security of storage devices
9954890, Nov 03 2008 FireEye, Inc. Systems and methods for analyzing PDF documents
9973531, Jun 06 2014 Musarubra US LLC Shellcode detection
Patent Priority Assignee Title
6205349, Sep 29 1998 Northwestern University Differentiating normal living myocardial tissue, injured living myocardial tissue, and infarcted myocardial tissue in vivo using magnetic resonance imaging
7668354, Mar 23 2005 Siemens Medical Solutions USA, Inc System and method for tracking and classifying the left ventricle of the heart using cine-delayed enhancement magnetic resonance
20090005673,
20090275822,
/////////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Nov 15 2011Siemens Aktiengesellschaft(assignment on the face of the patent)
Dec 09 2011XUE, HUISiemens CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0275360634 pdf
Dec 09 2011LIU, YIXUNSiemens CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0275360652 pdf
Dec 13 2011JOLLY, MARIE-PIERRESiemens CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0275360634 pdf
Dec 14 2011GUEHRING, JENSSiemens CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0275360652 pdf
Dec 15 2011GUETTER, CHRISTOPHSiemens CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0275360634 pdf
Jun 18 2013Siemens CorporationSiemens AktiengesellschaftASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0307180171 pdf
Jun 10 2016Siemens AktiengesellschaftSiemens Healthcare GmbHASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0392710561 pdf
Dec 19 2023Siemens Healthcare GmbHSIEMENS HEALTHINEERS AGASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0660880256 pdf
Date Maintenance Fee Events
Aug 09 2017M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Aug 06 2021M1552: Payment of Maintenance Fee, 8th Year, Large Entity.


Date Maintenance Schedule
Mar 25 20174 years fee payment window open
Sep 25 20176 months grace period start (w surcharge)
Mar 25 2018patent expiry (for year 4)
Mar 25 20202 years to revive unintentionally abandoned end. (for year 4)
Mar 25 20218 years fee payment window open
Sep 25 20216 months grace period start (w surcharge)
Mar 25 2022patent expiry (for year 8)
Mar 25 20242 years to revive unintentionally abandoned end. (for year 8)
Mar 25 202512 years fee payment window open
Sep 25 20256 months grace period start (w surcharge)
Mar 25 2026patent expiry (for year 12)
Mar 25 20282 years to revive unintentionally abandoned end. (for year 12)